Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp776727ybg; Mon, 1 Jun 2020 14:15:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyzN1Xb9WZWJ/Ru+xPNPqFncbQZ/h1MRawLQu1BEqF8/ykZ21QYihGcMF3RVs5kRIetWekK X-Received: by 2002:a17:906:1907:: with SMTP id a7mr20782684eje.251.1591046107018; Mon, 01 Jun 2020 14:15:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591046107; cv=none; d=google.com; s=arc-20160816; b=QhoYTIqoVfqdEijJArxtQ5Lh58wWsAWq6PTLGHfroLyt18w2PONdBMXTWQO72EQ/d8 KZOl8owMZnjEV2DcLtrOyx24DDINmxzc0rI5f4CA+WRGd2xR5i2Fexuzr6j1YsJ3L6GJ IUNCvVZ3Jc3T1CMv1GTEm6zmRsmor9KnSkci9pgEpv4+oxT3ukS4pOzvWH+KfqJcY2u4 g/m0sw4LYPurLkNGwGm9RF0SuQSIMSEuQSSBeucgK1teliJw2cCIPFuFzNgdseFGK9Nj nXKXaqOin0eB5NVC6ZjVon5IHEByZSVaNIclfqNyKMVn+5oy840EhriGJW7DCkhvekky 04Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=Azznz7slALPytZl+2dOuW8q3jDKhl6kRAejJKXyQyn8=; b=fe97KApYo6vyRgi6nqzimMgTuso7r0i6ku6fWDKEkOCp9yLesF2oRLx/sMNrfFhFqT nWvz/QvAUEPXnGNS45u8/gTLPD2zsJINHiteLFYR3CPy+k6oZ6+MVjWpe2gbMkGAjGt9 r5prKP/hfVqGB5waFiHXukk2pIhp3XeWx4jSV45cigQZd2xRdJDT27LC0jszeDVlq5RC SUsCzegWRn9Kwgs/hbmJqg/ClVRAz9BypQri4QQsgvqoWO1PC7jBEXSORUTYGqW59EQm OX2SRRAJ7roFLClaaoCxfpQOr3sGzNTiVoqyL65+6IWqyiO7VXOO9Nllt2KRfUUHBLrD Ub0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o11si318073edt.505.2020.06.01.14.14.44; Mon, 01 Jun 2020 14:15:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728753AbgFAVMh (ORCPT + 99 others); Mon, 1 Jun 2020 17:12:37 -0400 Received: from mout.kundenserver.de ([212.227.126.187]:41885 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727959AbgFAVMg (ORCPT ); Mon, 1 Jun 2020 17:12:36 -0400 Received: from mail-qt1-f172.google.com ([209.85.160.172]) by mrelayeu.kundenserver.de (mreue012 [212.227.15.129]) with ESMTPSA (Nemesis) id 1N30VJ-1iyiLf0kLV-013KLK; Mon, 01 Jun 2020 23:12:34 +0200 Received: by mail-qt1-f172.google.com with SMTP id z1so8982278qtn.2; Mon, 01 Jun 2020 14:12:33 -0700 (PDT) X-Gm-Message-State: AOAM533nA2M7X0nDNCszYQzXUCVp89iHBeSWdIULd1mVC8utIrefaarU 6gTBMaYCH1RBmUxZe/ZXl++W+8JEp99ko9v4VFU= X-Received: by 2002:ac8:4742:: with SMTP id k2mr16568747qtp.304.1591045953016; Mon, 01 Jun 2020 14:12:33 -0700 (PDT) MIME-Version: 1.0 References: <20200424221948.1120587-1-arnd@arndb.de> <20200507143552.GA28683@infradead.org> <20200528054600.GA29717@infradead.org> <20200528161416.GY1079@brightrain.aerifal.cx> <20200529143059.GA25475@infradead.org> <20200529175335.GK1079@brightrain.aerifal.cx> <20200601181259.GV1079@brightrain.aerifal.cx> In-Reply-To: <20200601181259.GV1079@brightrain.aerifal.cx> From: Arnd Bergmann Date: Mon, 1 Jun 2020 23:12:17 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [GIT PULL] sh: remove sh5 support To: Rich Felker Cc: John Paul Adrian Glaubitz , Christoph Hellwig , Linux-sh list , Yoshinori Sato , "linux-kernel@vger.kernel.org" , Al Viro , Rob Landley , Geert Uytterhoeven , Linus Torvalds Content-Type: text/plain; charset="UTF-8" X-Provags-ID: V03:K1:vnD1w4JIerwlVbUrWo+NrkH4+L+5V+6rEkGIinq8OlF6s3wAXtV nrPCLJyZRKHNfEIFbdt/vwySKjCVMiKiBnA5a4cII6OtAw0mNUh+RyGz+p5rwPrfAwZZrKN JUFdLBBAb5McBgsDozrzx01hOUXN2tHWUskOFf4zjiGyxug8TOtmd5uQUrFX6xxI2+dn7M6 04P0+RDBDA9XSS7kL4vcA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:ufMYFtxDZQc=:hx3cVG0gQM4l9JYE4Hyr24 dHMWcbDMSjr5HDKazRI1aSMJxCDiP8vrJ+tHsrm5dvBrJUipPl7bjREhsKppBZcI8mW84j18q vo676g7BH4x5fUwsGLTm62JPKQsejZ6rvXxREcScRZlT0a0E2o3d3rrxQgCaqK65vuRGo/cvW ObVm3OmXN5aHqYdqPjTYo1a40gcur2b+Bu+XRgN5Jdb7omlECCf6gwjfqaLQBmH1bRN/rE25j a0AW1gNN1gTwuykP8QJp10mZJFdwn1iOdm6AfDtJ9pL5mepbiQVM4PYQQioNftXxINMgqL9Oa AbGNZMNlxna9mUNRfS/xMseF09CN2jlch4Ynqz3Pqxwi4J5xuKs2AMdY16C2Vr0pPLkdLMe0y PDm2EI/th43Dp/t8p9xbAZydfkfIiEVAMwdfItoGF2QWtch+r4hf6mcJ+JQTDN2HUvogFpPRk h8C/3wKg5zHtR6YiltX7t9G2nLoJWSaGDZKOML+GcG4IVowTDCvQgAy5cm2UWaxDoy0hjDeaD V7FcJNgzg9UQjWYzDzWyAO9ox+2AChNbP+Ll+5lA0ue8YfaGju4BBqMNQFcW1D69s5A/fOcU4 oCuEfVfAaLvxjaN+UgyDODHFyAtRhjg1T7gBbA/miq9yPLeucy6rRyr5yIJ0mdY2zCda7uiZm yAUnzkR/jCa+ElkB4I1Jj9LqNS1n81gW8bJha1yraQCo95SSUlG/Xn2421plIBoHt6ZLELOIc /dAzW42p6vhiReWyG7fa6aODDE+xVPLbFABnWyW5R/8JH3dWBr01tF2j0sTt2Wvz25cZcTA3g 19FBmRq1qkC1jVhImaqbJDi4D45nuMo0uBKhjaZ8FC8WxXhW1U= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 1, 2020 at 8:13 PM Rich Felker wrote: > On Sat, May 30, 2020 at 10:08:09AM +0200, John Paul Adrian Glaubitz wrote: > > On 5/29/20 7:53 PM, Rich Felker wrote: > > > [PATCH next] sh: remove call to memset after dma_alloc_coherent > > > https://marc.info/?l=linux-sh&m=157793031102356&w=2 > > Can anyone confirm that this is correct/safe? Yes, this is safe, I checked both the API definition and the sh implementation in arch_dma_alloc(), which passes __GFP_ZERO. Arnd